Behavioral task
behavioral1
Sample
00d823b03a90ed6b429c1070383997dbb5989175130a9e8c0b998853830fc4d0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00d823b03a90ed6b429c1070383997dbb5989175130a9e8c0b998853830fc4d0.exe
Resource
win10v2004-20241007-en
General
-
Target
00d823b03a90ed6b429c1070383997dbb5989175130a9e8c0b998853830fc4d0
-
Size
50KB
-
MD5
721238198bd25447d3245d4112ffa54f
-
SHA1
380b467f81c3adf95c36db23ee786015db119d07
-
SHA256
00d823b03a90ed6b429c1070383997dbb5989175130a9e8c0b998853830fc4d0
-
SHA512
d456c271fee084e21100128dfaa077b3df3d38bb57f54af5ca0f6315926749b089753a9ded1812522f4ad3b7cbbd6a450ec608f71bf955fe05c2a45d379f2ac8
-
SSDEEP
768:/EU07c92/EyTAYtxqfGNC0klI7C8yOvi3eGYzbZoxf4AfnxWnksrHRXUHQTH:/g7wc1aGNC0klI7CPN3BcVoOAfn4dcQb
Malware Config
Signatures
-
Detects MyDoom family 1 IoCs
Processes:
resource yara_rule sample family_mydoom -
Mydoom family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 00d823b03a90ed6b429c1070383997dbb5989175130a9e8c0b998853830fc4d0
Files
-
00d823b03a90ed6b429c1070383997dbb5989175130a9e8c0b998853830fc4d0.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ